An arbitrary file creation vulnerability exists in PaperCut NG/MF that only affects Windows servers with Web Print enabled. This specific flaw exists within the image-handler process, which can incorrectly create files that don’t exist when a maliciously formed payload is provided. This can lead to local privilege escalation.
Note:
This CVE has been split into two (CVE-2024-4712 and CVE-2024-8405) and it’s been rescored with a "Privileges Required (PR)" rating of low, and “Attack Complexity (AC)” rating of low, reflecting the worst-case scenario where an Administrator has granted local login access to standard network users on the host server.
Metrics
Affected Vendors & Products
References
History
Thu, 30 Jan 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Microsoft
Microsoft windows Papercut Papercut papercut Mf Papercut papercut Ng |
|
Weaknesses | NVD-CWE-Other | |
CPEs | cpe:2.3:a:papercut:papercut_mf:*:*:*:*:*:*:*:* cpe:2.3:a:papercut:papercut_ng:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
Vendors & Products |
Microsoft
Microsoft windows Papercut Papercut papercut Mf Papercut papercut Ng |
Thu, 26 Sep 2024 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-59 | |
Metrics |
ssvc
|
Thu, 26 Sep 2024 02:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An arbitrary file creation vulnerability exists in PaperCut NG/MF that only affects Windows servers with Web Print enabled. This vulnerability requires local login/console access to the PaperCut NG/MF server (eg: member of a domain admin group). | An arbitrary file creation vulnerability exists in PaperCut NG/MF that only affects Windows servers with Web Print enabled. This specific flaw exists within the image-handler process, which can incorrectly create files that don’t exist when a maliciously formed payload is provided. This can lead to local privilege escalation. Note: This CVE has been split into two (CVE-2024-4712 and CVE-2024-8405) and it’s been rescored with a "Privileges Required (PR)" rating of low, and “Attack Complexity (AC)” rating of low, reflecting the worst-case scenario where an Administrator has granted local login access to standard network users on the host server. |
Title | Arbitrary file creation in PaperCut NG/MF Web Print | Arbitrary File Creation in PaperCut NG/MF Web Print Image Handler |
Weaknesses | CWE-77 | |
References |
| |
Metrics |
cvssV3_1
|
cvssV3_1
|

Status: PUBLISHED
Assigner: PaperCut
Published:
Updated: 2024-09-26T01:27:50.169Z
Reserved: 2024-05-10T05:15:31.461Z
Link: CVE-2024-4712

Updated: 2024-08-01T20:47:41.691Z

Status : Analyzed
Published: 2024-05-14T15:44:27.660
Modified: 2025-01-30T14:58:45.433
Link: CVE-2024-4712

No data.